Tag: proactive

  • Hacker News: Exposed GitHub repos, now private, can be accessed through Copilot

    Source URL: https://techcrunch.com/2025/02/26/thousands-of-exposed-github-repos-now-private-can-still-be-accessed-through-copilot/ Source: Hacker News Title: Exposed GitHub repos, now private, can be accessed through Copilot Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the risks associated with data exposure in generative AI systems, particularly focusing on Microsoft Copilot’s ability to access previously public data from GitHub repositories, even after…

  • Slashdot: UK Users Show Little Concern as Apple Removes iCloud Encryption

    Source URL: https://news.slashdot.org/story/25/02/26/1321235/uk-users-show-little-concern-as-apple-removes-icloud-encryption?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: UK Users Show Little Concern as Apple Removes iCloud Encryption Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Apple’s decision to disable end-to-end encryption for iCloud users in the UK, revealing a concerning trend in consumer privacy priorities, often referred to as the “privacy paradox.” The…

  • OpenAI : Deep research System Card

    Source URL: https://openai.com/index/deep-research-system-card Source: OpenAI Title: Deep research System Card Feedly Summary: This report outlines the safety work carried out prior to releasing deep research including external red teaming, frontier risk evaluations according to our Preparedness Framework, and an overview of the mitigations we built in to address key risk areas. AI Summary and Description:…

  • Alerts: CISA Releases Two Industrial Control Systems Advisories

    Source URL: https://www.cisa.gov/news-events/alerts/2025/02/25/cisa-releases-two-industrial-control-systems-advisories Source: Alerts Title: CISA Releases Two Industrial Control Systems Advisories Feedly Summary: CISA released two Industrial Control Systems (ICS) advisories on February 25, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-056-01 Rockwell Automation PowerFlex 755  ICSMA-25-030-01 Contec Health CMS8000 Patient Monitor (Update A)  CISA…

  • Schneier on Security: North Korean Hackers Steal $1.5B in Cryptocurrency

    Source URL: https://www.schneier.com/blog/archives/2025/02/north-korean-hackers-steal-1-5b-in-cryptocurrency.html Source: Schneier on Security Title: North Korean Hackers Steal $1.5B in Cryptocurrency Feedly Summary: It looks like a very sophisticated attack against the Dubai-based exchange Bybit: Bybit officials disclosed the theft of more than 400,000 ethereum and staked ethereum coins just hours after it occurred. The notification said the digital loot had…

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/02/25/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-49035 Microsoft Partner Center Improper Access Control Vulnerability CVE-2023-34192 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability Users and administrators are also encouraged…

  • Cisco Security Blog: AI Threat Intelligence Roundup: February 2025

    Source URL: https://blogs.cisco.com/security/ai-threat-intelligence-roundup-february-2025 Source: Cisco Security Blog Title: AI Threat Intelligence Roundup: February 2025 Feedly Summary: AI threat research is a fundamental part of Cisco’s approach to AI security. Our roundups highlight new findings from both original and third-party sources. AI Summary and Description: Yes Summary: The text emphasizes Cisco’s commitment to AI security through…

  • The Register: Malware variants that target operational tech systems are very rare – but 2 were found last year

    Source URL: https://www.theregister.com/2025/02/25/new_ics_malware_dragos/ Source: The Register Title: Malware variants that target operational tech systems are very rare – but 2 were found last year Feedly Summary: Fuxnet and FrostyGoop were both used in the Russia-Ukraine war Two new malware variants specifically designed to disrupt critical industrial processes were set loose on operational technology networks last…

  • The Register: Southern Water takes the fifth over alleged $750K Black Basta ransom offer

    Source URL: https://www.theregister.com/2025/02/25/southern_water_black_basta_leak/ Source: The Register Title: Southern Water takes the fifth over alleged $750K Black Basta ransom offer Feedly Summary: Leaked chats and spilled secrets as AI helps decode circa 200K private talks Southern Water neither confirms nor denies offering Black Basta a $750,000 ransom payment following its ransomware attack in 2024.… AI Summary…